首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   161篇
  免费   2篇
教育   91篇
科学研究   44篇
各国文化   4篇
体育   8篇
文化理论   4篇
信息传播   12篇
  2023年   1篇
  2022年   6篇
  2021年   7篇
  2020年   7篇
  2019年   10篇
  2018年   16篇
  2017年   10篇
  2016年   7篇
  2015年   4篇
  2014年   15篇
  2013年   21篇
  2012年   5篇
  2011年   14篇
  2010年   5篇
  2009年   6篇
  2008年   5篇
  2007年   3篇
  2006年   3篇
  2005年   2篇
  2000年   1篇
  1997年   4篇
  1995年   1篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1988年   1篇
  1983年   2篇
  1981年   2篇
  1979年   1篇
排序方式: 共有163条查询结果,搜索用时 15 毫秒
141.
Laser cleaning has been used to restore the soiled terracotta statues and decorations of the tympanum of the portal of Palos of the Cathedral of Seville in Spain. A simultaneous laboratory study performed on a representative sample helped to identify the optimum laser conditions to remove the dark soiling layer produced by air pollution. It was found that irradiation at 1064 nm with a Q-switched Nd:YAG laser was more effective than the harmonic wavelengths of 532 or 266 nm. LIBS and Raman microscopy gave information on the composition of terracotta and identified the presence of a protective layer made of gypsum and calcite. As detected by Raman spectroscopy, laser irradiation caused the elimination of the carbon component of the soiling layer and the appearance of an anhydrite component in the laser irradiated gypsum layer applied over the terracotta substrate for protective purposes. Local heating of the surface caused by laser irradiation at 1064 nm, the laser wavelength used for restoration of the portal, might be responsible for a process of partial dehydration of gypsum into anhydrite.  相似文献   
142.
143.
This research investigates the personality characteristics of Information Technology students (CIT) in UAE University (UAEU) and how such features impact their IT learning. To achieve this objective, this research attempts to explain the impact of the Big-5 factors on learning using survey research. Results from 179 respondents suggested that agreeableness, extraversion, openness, and conscientiousness respectively were the most important strategies adopted by CIT students. However, neuroticism scored the lowest. Such results could be attributed to personal as well as to cultural reasons as highlighted in this research. The research highlights theoretical as well as professional contributions and implications. Some of challenges in this research could be addressed by designing programs aiming at enhancing student’s learning ability from the perspective of their personal traits.  相似文献   
144.
The proliferation of mobile computing technologies is playing major role in the growth of mobile learning (M-learning) market around the globe. The purpose of this paper is to develop a research model in the lines of commonly used models the Unified Theory of Acceptance and Use of Technology (UTAUT) and Technology Acceptance Model (TAM) by incorporating constructs namely flexibility learning, social learning, efficiency learning, enjoyment learning, suitability learning, and economic learning that can predict M-learning adoption in a developing country. The data were collected from 388 students from all major universities/colleges in the capital city (Muscat) of Oman. The neural network modeling was employed to predict M-learning adoption. The neural network modeling results showed that flexibility learning, social learning, efficiency learning, enjoyment learning, suitability learning, and economic learning variables have significant influence on the intention of students to accept mobile learning. The key outcomes of this study suggest important determinants that can assist academic administrators and telecommunication service providers to enhance the adoption of M-learning with the help of suitable strategy.  相似文献   
145.
146.
Probabilistic analysis of linear elastic cracked structures   总被引:1,自引:0,他引:1  
This paper presents a probabilistic methodology for linear fracture mechanics analysis of cracked structures. The main focus is on probabilistic aspect related to the nature of crack in material. The methodology involves finite element analysis; sta- tistical models for uncertainty in material properties, crack size, fracture toughness and loads; and standard reliability methods for evaluating probabilistic characteristics of linear elastic fracture parameter. The uncertainty in the crack size can have a significant effect on the probability of failure, particularly when the crack size has a large coefficient of variation. Numerical example is presented to show that probabilistic methodology based on Monte Carlo simulation provides accurate estimates of failure prob- ability for use in linear elastic fracture mechanics.  相似文献   
147.
Visual motor integration (VMI) is the ability of the eyes and hands to work together in smooth, efficient patterns. In Oman, there are few effective methods to assess VMI skills in children in inclusive settings. The current study investigated the performance of preschool and early school years responders and non-responders on a VMI test. The full range test of visual motor integration (FRTVMI) was administered to a sample of 359 children from preschool and elementary school settings in Oman. A two-way analysis of variance showed that there are statistically significant differences in VMI between preschool and early school non-responders. Gender did not show any effect on preschool children's performance on the FRTVMI, whereas it had an effect on elementary school children's performance. Results of the study are discussed in relation to the use of VMI assessment in screening for responders and non-responders in preschool and elementary school settings. Implications for psycho-educational assessment of children who struggle academically in inclusive settings are presented.  相似文献   
148.
The main objective of the current study is to examine the role of the statistical relation between BCL2 gene (Ala43Thr) single nucleotide polymorphism and growth hormone (GH1) levels in Egyptian HCV genotype-4 patients before and after treatment with pegylated interferon plus ribavirin. Eighty patients with HCV genotype-4 and 40 healthy volunteers as controls were enrolled in the prospective study. Gene polymorphism of BCL2 (Ala43Thr) using PCR-RFLP technique and GH1 concentrations using ELISA procedure were measured for all patients and controls. The present study resulted that Responder HCV genotype-4 Patients, with BCL2 43Ala genotype, have high significant increase in pre-treatment GH1 levels (>1 ng/ml); which represent normal levels, as compared to non-responders pre-treatment GH1 levels (<1 ng/ml); which represent low concentrations. We concluded that HCV genotype-4 patients who have normal GH1 concentrations and BCL-2 43Ala genotype can successfully achieve response to interferon based therapy.  相似文献   
149.
150.
In this paper, a new technique is introduced for chaos secure data communication. In this approach, in addition to the usually used techniques for data encryption, the concept of carrier encryption is introduced to increase the security level of the secure communication scheme. To fulfill this objective, at the transmitting end, two chaotic oscillators are coupled, and a set of inequality time dependent constraints with time dependent bounds is imposed on the generated chaotic signals. Moreover, to increase system complexity and its security level, the imposed set of constraints and their bounds are allowed to be changeable from one time period to another during the transmission process. As a result, the patterns of the generated chaotic signals are completely changed and the chaotic oscillator is completely encrypted. At the receiving end, the newly developed Constrained Smoothed Regularized Least Square (CSRLS) observer is used to synchronize the received constrained chaotic signals and hence retrieve the transmitted data. Using such an approach, the quality of the received information, measured by the Bit Error Rate (BER), is highly improved due to the superior performance of the developed CSRLS observer. The stability of the observer is analyzed, and simulation results are presented to show the efficiency and effectiveness of the proposed secure communication scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号